10 I comandi mother :~# vserver vserver [ options ] server-name command... server-name is a directory in /vservers The commands are: build : Create a virtual server by copying the packages of the root server enter : Enter in the virtual server context and starts a shell Same as "vserver name exec /bin/sh" exec : Exec a command in the virtual server context suexec : Exec a command in the virtual server context uid service : Control a service inside a vserver vserver name service service-name start/stop/restart/status start : Starts the various services in the vserver, runlevel 3 stop : Ends all services and kills the remaining processes running : Tells if a virtual server is running It returns proper exit code, so you can use it as a test status : Tells some information about a vserver chkconfig : It turns a server on or off in a vserver --nodev : Do not configure the IP aliases of the vserver Useful to enter a vserver without enabling its network and avoiding conflicts with another copy of this vserver running elsewhere --silent : No informative messages about vserver context and IP numbers Useful when you want to redirect the output mother :~# vserver wonko enter ipv4root is now New security context is 10 df Filesystem 1K-blocks Used Available Use% Mounted on /dev/hdv % / 10

14 Esempio 1 IPROOT= IPROOTMASK= IPROOTBCAST= IPROOTDEV=eth0 ONBOOT=no S_HOSTNAME=marvin.stat.unipd.it S_DOMAINNAME= S_NICE= # You can set various flags for the new security context # lock: Prevent the vserver from setting new security context # nproc: Limit the number of processes in the vserver according to ulimit # (instead of a per user limit, this becomes a per vserver limit) S_FLAGS="lock nproc" ULIMIT="-H -u 1000" # You can set various capabilities. By default, the vserver are run # with a limited set, so you can let root run in a vserver and not # worry about it. He can't take over the machine. In some cases # you can to give a little more capabilities (such as CAP_NET_RAW) S_CAPS="CAP_NET_RAW" 14

How to Backup XenServer VM with VirtualIQ 1. Using Live Backup of VM option: Live Backup: This option can be used, if user does not want to power off the VM during the backup operation. This approach takes

The information presented should act as a guide to Red Hat Linux networking. It is intended to be accompanied with training and self study. To access most of these items you will need to have root access,

Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,

Get quick control over your Linux server with server commands by Jack Wallen Linux is a powerful environment for both the desktop and server: Both systems have matured so any action can be managed with

Setting up PostgreSQL 1 Introduction to PostgreSQL PostgreSQL is an object-relational database management system based on POSTGRES, which was developed at the University of California at Berkeley. PostgreSQL

CompTIA Linux + Certification Week 9 Projects Project 9-1 In this hands- on project, you view characteristics of processes using the ps command. 1. Turn on your computer. After your Linux system has loaded,

CIS Networking Installing Ubuntu Server on Windows hyper-v Much of this information was stolen from http://www.isummation.com/blog/installing-ubuntu-server-1104-64bit-on-hyper-v/ Create a virtual machine

INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network

Redhat 6.2 Installation Howto -Basic Proxy and Transparent This is a guide document although very detailed in some sections. It assumes you have a have an idea about installing RH and working with Linux.

SEED Document 1 User Manual of the Pre-built Ubuntu 9 Virutal Machine Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document is funded by the National Science Foundation

STEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE Note : Command Lines are in red. Congratulations on following all 3 steps. This is the final step you need to do to get rid of the old

Getting started with ARM-Linux www.embeddedarm.com (480)-837-5200 usa Connecting serial communications and power (JP2 must be installed to enable console) An ANSI terminal or a PC running a terminal emulator

Navigating the Rescue Mode for Linux SUPPORT GUIDE DEDICATED SERVERS ABOUT THIS GUIDE This document will take you through the process of booting your Linux server into rescue mode to identify and fix the

Virtual Private Systems for FreeBSD Klaus P. Ohrhallinger 06. June 2010 Abstract Virtual Private Systems for FreeBSD (VPS) is a novel virtualization implementation which is based on the operating system

Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install

Light-Weight and Resource Efficient OS-Level Virtualization 1 Introduction Computers have become sufficiently powerful to use virtualization to create the illusion of many smaller virtual machines, each

Installation & Configuration Guide for Solaris 8 Document version 1.1.2, 2003-02-27 CWRU Information Technology Services If you have any questions or problems using these instructions, simply contact the

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught

VNC Background VNC means Virtual Network Computing, is an open-source, crossplatform protocol for viewing GUI desktops on remote machines within a LAN or over a WAN/Internet connection. This document discusses

Load Balancing/High Availability Configuration for neoninsight Server Introduction: This document provides details on the configuration and the components used for a two node load balancing system with

INF-110 GPFS Installation Overview Plan the installation Before installing any software, it is important to plan the GPFS installation by choosing the hardware, deciding which kind of disk connectivity

Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

HOWTO: Set up a Vyatta device with ThreatSTOP in bridge mode Overview This document explains how to set up a minimal Vyatta device in a transparent bridge configuration and then how to apply ThreatSTOP

HOWTO: Set up a Vyatta device with ThreatSTOP in router mode Overview This document explains how to set up a minimal Vyatta device in a routed configuration and then how to apply ThreatSTOP to it. It is

SSH and FTP on Ubuntu 9.04 WNYLUG Neal Chapman 09/09/2009 SSH (Secure Shell) Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices.

LAMP Quickstart for Red Hat Enterprise Linux 4 Dave Jaffe Dell Enterprise Marketing December 2005 Introduction A very common way to build web applications with a database backend is called a LAMP Stack,

CHAPTER 3 Basic Installation of the Cisco Collection Manager Introduction This chapter gives the information required for a basic installation of the Cisco Collection Manager and the bundled Sybase database.

Firewall Lab This lab will apply several theories discussed throughout the networking series. The routing, installing/configuring DHCP, and setting up the services is already done. All that is left for

Red Hat Certifications: Red Hat Certified System Administrator (RHCSA) Overview Red Hat is pleased to announce a new addition to its line of performance-based certifications Red Hat Certified System Administrator

Pen Test Tips 2 Shell vs. Terminal Once you have successfully exploited a target machine you may be faced with a common dilemma that many penetration testers have, do I have shell access or terminal access?

and Linux Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 5 January 2015 Common/Reports/linux-file-permissions.tex, r1071 1/15 Multiuser and Server Operating

Laboration 3 - Administration During this laboration we will learn how to install, configure and test servers that will allow you to have access remote machines, copy files between computers and file sharing.

Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L Introduction: This guide is written to help any person with little knowledge in AIX V5.3L to prepare the P Server

LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

XC LICENSE SERVER Setting Up the Site Licenses INTRODUCTION To complete the installation of an XC Site License, create an options file that includes the Host Name (computer s name) of each client machine.

IP : nnn.nnn.nnn.n 173.255.141.4 Hostname : example.domain.com webserver.theewfinc.org OS : CentOS release 6.6 (Final) The following is a report on the security and performance of your server. It includes

ESX 4 Patch Management Guide ESX 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

The following guide will help you to setup the hosts, in case you want to run multiple websites on your VPS. This is similar to setting up a shared server that hosts multiple websites, using a single shared

High Availability Cluster Solutions for Ubuntu14.04 on Power Author: Iranna D. Ankad (iranna.ankad@in.ibm.com) PowerLinux Test Architect Abstract: In this article we focus on how to set up a two-node apache